WebHome 184 - 08 Jul 2013 - Main.IanSullivan
|
| Computers, Privacy, & the Constitution
Professor Eben Moglen Columbia Law School, Spring 2013 | |
< < | | > > | | | | |
> > | My office hours are Thursdays 11-1 and 3-4, in JG642, and by arrangement at other times. Please email moglen@columbia.edu for an appointment, or consult my assistant, Ian Sullivan, at 212-461-1905. | | | |
< < | Technology project 2: Better browsing control | > > | | | | |
< < | | > > |
Tech project 1: Create a GPG key and upload it to the keyservers
| | | |
< < |
| > > | | | | |
< < | My office hours are Thursdays 11-1 and 3-4, in JG642, and by arrangement at other times. Please email moglen@columbia.edu for an appointment, or consult my assistant, Ian Sullivan, at 212-461-1905. | > > | Technology project 2: Better browsing control
| | | |
< < |
| > > | | | | |
< < | Tech project 1: Create a GPG key and upload it to the keyservers | > > | | | | |
< < | Linux instructions | > > | | | | |
< < | There are a number of tools available to Linux users including many different plugins for popular email clients. I recommend using the enigmail plugin for the Thunderbird mail client as a place to start. Install both tools as you would any other software and then take a look at this quickstart guide from Enigmail: Enigmail quick start | | | |
< < | OSX Instructions | > > | | | | |
< < | The GPGTools project maintains an easy installer for GPG and instructional materials for generating a key and uploading it to the keyservers. Take a look at their homepage for the software and a video explanation, then refer to their Where do I start? guide for more detailed instructions. | > > | Introduction to the NSA surveillance apparatus | | | |
< < | Windows instructions | > > | Part 1: Prisms, internet giants, and James Bond | | | |
< < | The GPG4win project maintains an easy installer for GPG and instructional materials for generating a key and uploading it to the keyservers. Take a look at their homepage for the software, then refer to their Gpg4win Compendium guide for more detailed instructions. | > > | Part 2: Distilling Our Data | | | |
< < | | > > | Part 3: Sharing is caring | | | |
< < | | > > | Part 4: Technology of Power | | | |
< < | Understanding SSL security | > > | | | | |
< < | Background | > > | See also "NSA Domestic Spying Program" section of PartFour.
| | | |
< < | Emerging Threats to Online Trust: The Role of Public Policy and Browser Certificates, Presentation, transcript, slides(pdf). October 22, 2010
Declan McCullagh, Why browsers differ on Web sites' safety, CNet, March 28, 2011 | > > |
| | | |
< < | Comodo breach | > > | On The Radar | | | |
< < | Declan McCullagh and Elinor Mills, Google, Yahoo, Skype targeted in attack linked to Iran, CNet, March 23, 2011
Declan McCullagh and Elinor Mills, Hackers exploit chink in Web's armor, CNet, March 24, 2011 | > > | Jennifer Valentino-Devries and Siobhan Gorman, Secret Court's Redefinition of 'Relevant' Empowered Vast NSA Data-Gathering, Wall Street Journal, July 8, 2013 | | | |
< < | DigiNotar breach | > > | Philip Dorling, Snowden reveals Australia's links to US spy web, The Age, July 8, 2013 | | | |
< < | Gregg Keizer, Hackers may have stolen over 200 SSL certificates, Computerworld, August 31, 2011
Charles Arthur, Rogue web certificate could have been used to attack Iran dissidents, The Guardian, August 30, 2011 | > > | Christian Stöcker, GCHQ Surveillance: The Power of Britain's Data Vacuum, Der Spiegel, July 07, 2013 | | | |
< < | Flame malware | > > | Tom Hays, NYC cases show crooked cops' abuse of FBI database, Yahoo News, July 7, 2013 | | | |
< < | Dan Goodin, "Flame" malware was signed by rogue Microsoft certificate, ars technica, June 4, 2012
Lance Whitney, Flame virus can hijack PCs by spoofing Windows Update, CNet, June 5, 2012 | > > | Craig Timberg and Ellen Nakashima, Agreements with private companies protect U.S. access to cables’ data for surveillance, The Washington Post, July 6, 2013 | | | |
< < | TURKTRUST breach | > > | cgh with wire reports, Snowden Search: Bolivia Irate over Forced Landing, Der Spiegel, July 03, 2013 | | | |
< < | djwm, Fatal error leads TURKTRUST to issue dangerous SSL certificates, H-online, January 4, 2013
Dennis Fisher, TURKTRUST Incident Raises Renewed Questions About CA System, threatpost.com, January 4, 2013 | > > | cgh, Guardian Report: US Engaged in Vast Spying Operation on Europe, Der Spiegel, July 01, 2013 | | | |
< < | | > > | Laura Poitras, Marcel Rosenbach, Fidelius Schmid, and Holger Stark, Attacks from America: NSA Spied on European Union Offices, Der Spiegel, June 29, 2013 | | | |
< < | Glenn Greenwald, Fisa court oversight: a look inside a secret and empty process, The Guardian, June 20, 2013. | > > | Glenn Greenwald, Fisa court oversight: a look inside a secret and empty process, The Guardian, June 20, 2013 | | James Risen and Nick Wingfield, Web’s Reach Binds N.S.A. and Silicon Valley Leaders, The New York Times, June 19, 2013 | | Spiegel Staff, The German Prism: Berlin Wants to Spy Too, Spiegel Online International, June 17, 2013 | |
< < | Ewen MacAskill? , Nick Davies, Nick Hopkins, Julian Borger, and James Ball, GCHQ intercepted foreign politicians' communications at G20 summits, The Guardian, June 16, 2013 | > > | Ewen MacAskill, Nick Davies, Nick Hopkins, Julian Borger, and James Ball, GCHQ intercepted foreign politicians' communications at G20 summits, The Guardian, June 16, 2013 | | Stephen Braun, Anne Flaherty, Jack Gillum, and Matt Apuzzo, Secret to Prism program: Even bigger data seizure, Associated Press, June 15, 2013 | | Steve Lohr, Big Data, Trying to Build Better Workers, The New York Times , April 20, 2013 | |
> > | D.B. Grady, Inside the secret world of America's top eavesdropping spies, The Week, April 12, 2012 | | Max Fisher, Chinese hackers outed themselves by logging into their personal Facebook accounts, The Washington Post, February 19, 2013
Mathew Ingram, The increasingly blurry line between Big Data and Big Brother, Gigaom.com, February 1, 2013 |
|
|
|
This site is powered by the TWiki collaboration platform. All material on this collaboration platform is the property of the contributing authors. All material marked as authored by Eben Moglen is available under the license terms CC-BY-SA version 4.
|
|